1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
14

Anti-bullying laws in most states are designed to provide

Computers and Technology
2 answers:
dangina [55]3 years ago
8 0
I would put it as c but that what i think 

Bad White [126]3 years ago
8 0
Okay. Anti-bullying laws aren't exactly designed to specifically say why people bully others online nor to give advice for preventing online bullying.. Therefore, B and D are out. It doesn't fully give guidelines for appropriate online behavior, but more of reasons with helping schools find ways to punishing those who bully online. The answer is C.
You might be interested in
In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
sp2606 [1]

Answer:

True

Explanation:

4 0
3 years ago
Which statements describe the advantages of using XML
nataly862011 [7]

Answer:

1. It saves file space.

2. It allows for data storage in a separate file.

Explanation:

3 0
2 years ago
An authenticated user can add up to how many computer accounts to the domain, by default
Brums [2.3K]
By default, 10 computers can be joined to the domain by both users and administrators. As long as a user is authenticated against the Active Directory, he or she can add up to 10 computers to the domain.
While this one posses as an advantage for smaller companies, it is not a desirable feature for bigger companies since they have to control more tightly who can add machines to their domain.
7 0
3 years ago
Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
fiasKO [112]

Answer:

Your computer now has the IP address of that website cached, and no longer has to lookup the IP address of that domain name. The TTL of the first query is bigger than the TTL of the second query as less time was taken to execute the request.

Explanation:

On the first request to the website, the computer needs to contact other machines to find the record of the IP address.

On the second request, the computer already has the IP address and can use that to connect.

6 0
3 years ago
Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30
V125BC [204]

Answer:

The answer is "5 users and 1 block".

Explanation:

In Option a:

Bandwidth total = 1-Gbps \times 1000

                          = 1,000 \ Mbps      

Any User Requirement = 200 \ Mbps

The method for calculating the number of approved users also is:  

Now, calculate the price of each person for overall bandwidth and demands,  

\text{Sponsored user amount} = \frac{\text{Bandwidth total}}{\text{Each user's requirement}}

                                     =\frac{1000}{200}\\\\=\frac{10}{2}\\\\= 5 \ users

In Option b:

\text{blocking probability} = \frac{link}{\text{1-Gbps} = 10^9 \frac{bits}{sec}}

\ let = 0.05 = \frac{100}{20} \\\\\text{blocking probability} = \frac{ 200 \times 10^6}{\frac{100}{20}}

                                = \frac{ 200 \times 10^6 \times 20 }{100}\\\\= \frac{ 2 \times 10^6 \times 20 }{1}\\\\= 40 \times 10^6 \\\\

mean user = 25 \times \frac{1}{20} \\\\

                  = 1.25

max user = \frac{10^9}{40 \times 10^6} \\\\

                = \frac{10^9}{4 \times 10^7} \\\\ = \frac{10^2}{4} \\\\ = \frac{100}{4} \\\\= 25 \\\\ =\ \ 1 \ \ block \\\\

3 0
3 years ago
Other questions:
  • What type of data visual would you use to illustrate trends over time? Gantt chart Bar graph Line chart Scatter diagrams
    5·1 answer
  • What does BMP stand for?
    10·2 answers
  • Which item refers to an illusion of figures and shapes in motion, which we commonly see in movies and video games?
    9·1 answer
  • Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
    7·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    9·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
  • you are asked to create a four-digit code using the numbers from 1 to 9. how many possible codes are there--assuming that number
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!